Voorbeelden van het gebruik van Security rule in het Engels en hun vertalingen in het Nederlands
{-}
-
Colloquial
-
Financial
-
Official
-
Ecclesiastic
-
Medicine
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
Security rules.
Computer security rules.
Centrally manage all of your metadata and security rules.
The security rules adopted by the ECB are minimum rules. .
Allow local connection security rules.
Security rules for specific areas
While my the very first security rule was that.
always stick to the 5 security rules.
Shall ensure that security rules for the personal data are complied with.
We recommend that you provide a comprehensive description for your connection security rule.
The security rules for a classified contract are essentially determined as follows.
Require encryption for all connection security rules that use these settings.
The Council's security rules shall apply mutatis mutandis to the European Council.
Developers can access a full-text search engine that automatically respects enterprise security rules.
To correspond with our security rules, the password must consist of no less than 8 characters.
Select the option to specify that network traffic that matches another IPsec connection security rule does not go through the IPsec tunnel.
Apply the general PC security rules- update your anti-virus, web protection and firewall.
Ports tab of the Connection Security Rule Properties page.
The Security Rule is intended to protect the confidentiality of medical information.
range of IP addresses of the first endpoint as configured on the Computers tab of the Connection Security Rule Properties page.
Council decision on the security rules for protecting EU classified information.
Security rules on the protection of classified
types to which the rule applies, as configured on the Advanced tab of the Connection Security Rule Properties page.
Article 25- Security rules on the protection of classified
Ports tab of the Connection Security Rule Properties page.
Do not name a security rule”all” because that name conflicts with the all keyword in the netsh command.
public, to which the rule applies, as configured on the Advanced tab of the Connection Security Rule Properties page.
The connection security rule applies to communications between any computer in Endpoint 1
on the Authentication tab on the Connection Security Rule Properties page.
you can change these settings in the Connection Security Rule Properties dialog box.